Powered by an intelligent detection engine, WAPPLES is capable of combating the newest threats, including attacks often utilized in Advanced Persistent Threats (APT) launched by malicious agents to obtain data assets of governments and enterprises or for terrorism or political gains.

Utilizing 28 pre-configured detection rules, modified and even unknown attacks are categorized and blocked heuristically and semantically. This proprietary technology allows WAPPLES to deliver superior security with industry-leading accuracy and low false positive rates under various network environments. Maintaining high stability and performance, WAPPLES’ ease of deployment and low operational workload was recognized by Gartner as what made the WAF a popular choice for surveyed clients.

Through the analysis of an attack’s characteristics, WAPPLES is able to identify attacks that utilize new patterns of exploit that often bypass typical WAFs utilizing signature-based detection engines.

1st and 2nd generation WAFs that operate on blacklists and whitelists lag behind due to their reliance on signature updates to detect the latest threats. In comparison, the sophistication of security that WAPPLES can provide greatly surpasses that of signature-based WAFs.

Can be deployed in Reverse proxy, Inline, or High Availability (HA) configuration modes

Support for EtherChannel and Multi-Segment

Integration with SIEM (Micro Focus ArcSight, Splunk)

Deployment

Specifications

Value Class

Model

WAPPLES-100

WAPPLES-500

Maximum Throughput

300 Mbps

500 Mbps

Type

1U

1U

Memory

4 GB

8 GB

HDD

500 GB

500 GB

Performance Class

Model

WAPPLES-1200

WAPPLES-1400

WAPPLES-2400

Maximum Throughput

1 Gbps

1 Gbps

2 Gbps

Type

2U

2U

2U

Memory

16 GB

16 GB

24 GB

HDD

1 TB

1 TB

1 TB

SSD

256 GB

256 GB

256 GB

High-End Class

Model

WAPPLES-4000

WAPPLES-5200

WAPPLES-10000

Maximum Throughput

4 Gbps

5 Gbps

8 Gbps

Type

2U

2U

2U

Memory

32 GB

48 GB

64 GB

HDD

1 TB

1 TB

1 TB

SSD

256 GB

256 GB

256 GB

Implementation

When a customer chooses to deploy WAPPLES, a thorough analysis of the customer environment will be conducted prior to installation. This is important for optimizing policy settings tailored to specific operational and business needs to achieve an optimal configuration. Post-installation, detection logs are also monitored over a period of time and analyzed to further fine-tune the security policies and complete the implementation process.